Search Our Site

Hear from

Was needing IT services in my home and they were able to come out the next business day. Was very impressed that they could fix the issue so quickly and efficiently. Very helpful, knowledgeable and courteous as well! Would highly recommend RE2!read more

Hear from

Was needing IT services in my home and they were able to come out the next business day. Was very impressed that they could fix the issue so quickly and efficiently. Very helpful, knowledgeable and courteous as well! Would highly recommend RE2!

Android Defenses Breached On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero. The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked

The Fall of a Crypto Exchanger Cryptocurrencies have been gaining momentum in the last few years as an alternative means of currency. However due to the means by which cryptocurrencies exist, they are susceptible to abuse and have been many time en-counting. Many news posts and articles lately involve the same old story of hackers

Recently a post has surfaced regarding WordPress, the web-hosting site. Apparently it is being attacked by cryptomining code, stealing the information and resources of computers visiting the site. It is believed the Monero cryptocurrency is to blame for the mining. Sucuri, the researchers that noticed the mining, say that while the front end of website

The government has always had a side of it that is less than reputable, usually when it involves the interference of other countries and governments under the guise of “for our own good”. However as of late, it seems the government isn’t what we need to worry about when it comes to interference in others’

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years. Recently, a group of security researchers have discovered a simple but obviously effective hacking method, that has been linked to affecting thousands of people. The location of the hacks have

January 13th, all was right, until a sneaky little hacker came crawling in the night. To steal and plunder, wallets oh wonder, riches they desire watch them set fire. So basically, hackers have stolen crypto wallets from the Stellar Lumen currency. Thus far there has been no claim as to who has stolen the wallets

Recently announced, a Russian hacker group known as “Pawn Storm” has taken to the web for a bold attack on the Senate. In an attempt to gain email access, tensions rise in the US governments management of the continual Russian online invasions from hackers abound. This hacking group has been known for its penetration of

Recently we had a post involving some hacking attempts against those in cooperation with the 2018 Winter Olympics. The hacking attempts involved sending malware-full emails from spoof accounts to those with information on the progression and supervising of the 2018 Winter Olympics in Pyeonchang. Russia had been banned from the Olympics a little over a

Everyone knows of the virus security program McAfee, so that will make this information a little funny, but the cyber security expert John McAfee’s twitter account had been hacked. This curious turn of events had occurred in order to promote specific alternative cryptocurrencies to invest in. Last week, McAfee’t twitter account had been hacked and

2017 was a big year for technology and it’s hacking abusers. With the new year already in progress we were all hoping for a nice downtime from the bad news and potential dangers. Sadly that isn’t the case right now. Recently reported were attempts of maleware infection affecting those involved in the Pyeongchang Winter Olympics.